Author of the publication

An Agent-Based Concept for Problem Management Systems to Enhance Reliability

, , and . TAAC 2014 - Theoretical and Applied Aspects of Cybernetics, Kiew, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint Optimization of Traffic and Computation Offloading in UAV-Assisted Wireless Networks., , , , , and . MASS, page 475-480. IEEE Computer Society, (2018)Joint Optimization of Downlink and D2D Transmissions for SVC Streaming in Cooperative Cellular Networks., , , , , , and . WASA, volume 9798 of Lecture Notes in Computer Science, page 149-161. Springer, (2016)A search and summary application for traffic events detection based on Twitter data., , , , and . SIGSPATIAL/GIS, page 549-552. ACM, (2014)Heterogeneous Multisensor Data Fusion with Neural Network: Creating Network Security Situation Awareness., , , and . IMECS, page 42-46. Newswood Limited, (2007)A Useful System Prototype for Intrusion Detection - Architecture and Experiments., , and . Discovery Science, volume 3245 of Lecture Notes in Computer Science, page 388-395. Springer, (2004)End-to-end performance of network with coding-aware., , , and . CHINACOM, page 831-835. IEEE Computer Society, (2011)Deriving Spatio-Temporal Development of Ground Subsidence Due to Subway Construction and Operation in Delta Regions with PS-InSAR Data: A Case Study in Guangzhou, China., , , , , , and . Remote Sensing, 9 (10): 1004 (2017)Network Security Situation Awareness Based on Heterogeneous Multi-sensor Data Fusion and Neural Network., , , and . IMSCCS, page 352-359. IEEE Computer Society, (2007)A Survey of MAC Protocols Design Strategies and Techniques in Wireless Ad Hoc Networks., , , and . JCM, 9 (1): 30-38 (2014)An Energy Efficient Random Walk Based Expanding Ring Search Method for Wireless Networks., , , , and . ICYCSEE, volume 503 of Communications in Computer and Information Science, page 16-22. Springer, (2015)